Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire.

This professional-level book - aimed at law enforcement personnel, prosecutors, and corporate investigators - provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals.

Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or network

Places a special emphasis on how to thoroughly investigate criminal activity and now just perform the initial response

Walks you through ways to present technically complicated material in simple terms that will hold up in court

Spotlight

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Learn about personal data bankruptcy and the cost of privacy, security and compliance, delivering digital security to a mobile world, and much more.

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”

The code redirects visitors to another URL where the Fiesta exploit kit is hosted, which then tries to detect and exploit several vulnerabilities in various software. If it succeeds, the visitors are saddled with a banking Trojan.

Looking for an Android-based tablet for your child but don't know which one to choose? If you are concerned about the device's protection against random hackers, Bluebox Security has just released a review of the nine most popular Android tablet models aimed specifically at children.